CVE-2007-6016
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
29/02/2008
Last modified:
09/04/2025
Description
Multiple stack-based buffer overflows in the PVATLCalendar.PVCalendar.1 ActiveX control in pvcalendar.ocx in the scheduler component in the Media Server in Symantec Backup Exec for Windows Server (BEWS) 11d 11.0.6235 and 11.0.7170, and 12.0 12.0.1364, allow remote attackers to execute arbitrary code via a long (1) _DOWText0, (2) _DOWText1, (3) _DOWText2, (4) _DOWText3, (5) _DOWText4, (6) _DOWText5, (7) _DOWText6, (8) _MonthText0, (9) _MonthText1, (10) _MonthText2, (11) _MonthText3, (12) _MonthText4, (13) _MonthText5, (14) _MonthText6, (15) _MonthText7, (16) _MonthText8, (17) _MonthText9, (18) _MonthText10, or (19) _MonthText11 property value when executing the Save method. NOTE: the vendor states "Authenticated user involvement required," but authentication is not needed to attack a client machine that loads this control.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.6235:*:*:*:*:*:* | ||
| cpe:2.3:a:symantec:backup_exec_for_windows_server:11d:11.0.7170:*:*:*:*:*:* | ||
| cpe:2.3:a:symantec:backup_exec_for_windows_server:12.0:12.0.1364:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/27885
- http://secunia.com/secunia_research/2007-101/advisory/
- http://securitytracker.com/id?1019524=
- http://seer.support.veritas.com/docs/308669.htm
- http://www.securityfocus.com/bid/26904
- http://www.symantec.com/avcenter/security/Content/2008.02.28.html
- http://www.symantec.com/avcenter/security/Content/2008.02.29.html
- http://www.vupen.com/english/advisories/2008/0718
- http://www.vupen.com/english/advisories/2008/2672
- https://www.exploit-db.com/exploits/5205
- http://secunia.com/advisories/27885
- http://secunia.com/secunia_research/2007-101/advisory/
- http://securitytracker.com/id?1019524=
- http://seer.support.veritas.com/docs/308669.htm
- http://www.securityfocus.com/bid/26904
- http://www.symantec.com/avcenter/security/Content/2008.02.28.html
- http://www.symantec.com/avcenter/security/Content/2008.02.29.html
- http://www.vupen.com/english/advisories/2008/0718
- http://www.vupen.com/english/advisories/2008/2672
- https://www.exploit-db.com/exploits/5205



